Soccer club defrauded
How to steal a million (OK, half a million), or what happened to the Boca Juniors
1183 articles
How to steal a million (OK, half a million), or what happened to the Boca Juniors
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
Although the suspected leader of the FIN7 cybergang was arrested, malicious activity somehow persists.
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
In this episode of the Kaspersky Lab podcast, Jeff and Ahmed take a look at the first day of the Security Analyst Summit in Singapore.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
In this episode of the Kaspersky Lab podcast, Dave and Jeff discuss the perils of downloading shows, like Game of Thrones, on torrents, Facebook calling for regulation, Toyota breaches, and more.
Do you use plugins on your website? Make sure they are updated regularly.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Introduction Sharing personal and valuable information online has become essential in modern life. A decade ago, the majority of organizations were still prepared to interact with their customers through physical